-
Notifications
You must be signed in to change notification settings - Fork 661
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Help: using Siemens WinCC to access python server #680
Comments
we need more info, what problem do you have? what error? |
FYI: Other OPC UA clients can access the Python OPC UA server and the WinCC client can access other servers. Only the combination Python OPC UA Server and WinCC Client does not work. I tried three different ways:
Result: Variables cannot be browsed, no connection to server
Result: Variables cannot be browsed, no connection to the server
Result: Variables can be browsed, no communication with the server during runtime, no error message |
You will probably have to use wire shark to see what WinCC is really doing. |
Yes you will need to record a session with Wireshark in case 2 so we understand what they want. But no certificate is necessary when selecting None/None. This is a most probably a bug on their side |
I think someone on here once posted that WinCC requires encryption by default. |
I am currently in contact with the Siemens Support and will keep you updated. |
The following statement came from Siemens Support: |
I had a discussion with the product people a few month ago on that topic and they were confident that a certificate was not necessary. But anyway, they can require a certificate if they want and inform users. But the second scenario need to be debugged. Can you save a session with Wireshark or similar and attach to this bug report? |
Record one session with Python and one with another client that works |
@oroulet Could this be related to the uaprocessor replying to FindServersRequest with the default endpoint-url of 'opc.tcp://0.0.0.0:4840/freeopcua/server/'? But some clients won't do that. The above would allow binding to multiple interfaces and still use clients that are confused by this 0.0.0.0 (and even allow vpn and/or use port forwarding without UA-GDS). More info: Outgoing to client: |
@brubbel this is a spossible issue. I remember having a hack something similar 10 years ago.. here: https://github.com/SintefRaufossManufacturing/icehms/blob/master/src/python/icehms/icemanager.py#L121 The main idea is to get the IP address of the client, open a dummy socket against it and find out which of our interface was used... this is crazy complicated and might not be reliable.... Maybe it is better to write a warning that we are using 0.0.0.0 as address and that some clients do not like it... and advice to use the current server IP address on the interface we want... |
@ElisabethMZ Could you provide feedback if the following condition works for WinCC:
@oroulet Are you in favor of the following solution:
Is there such a thing as a no-encryption-certificate? |
Thank you for your comments. Now I have new experiences:
I was also looking for a no-encryption-certificate, but I found nothing. |
@ElisabethMZ The correct settings are as follows:
Apply all steps carefully. WinCC is quite picky on the application of the opc-ua standard. Cfr PR under construction. |
@brubbel what version of WinCC 15 are you using? We could not get it working with WinCC Professional. Just heard back from the support, they are passing our channel diagnosis data on to the development team 👍 |
WinCC Advanced Version V15 it says. I would suppose they are based on the same backend. |
Just heard back from the Siemens support a fix is coming in V15 SP1. |
I like it when, with our small part time hobby project, we trigger bugs in industrial software installed all around the world... |
I am having difficulty accessing an opcua server created in python using WinCC.
Has anybody had success getting a connection to work?
Siemens support insists the problem must be caused by improper handling of the certificate in python-opcua
Thank you for your support!
The text was updated successfully, but these errors were encountered: